End Notes


1. The U.S. Employment Service (USES) was created by the passage of the Immigration Act on February 20, 1907. Originally a division of the Bureau of Immigration and Naturalization and later a bureau within the Department of Labor, the USES helped place immigrants in jobs around the country.

2. USAJOBS website, "Privacy Policy," n.d. Available at www.usajobs.opm.gov/privact.htm.

3. Garfinkel, Database Nation, pp. 20–21.

4. United States General Accounting Office, "Identity Theft: Prevalence and Cost Appear to Be Growing," (March 2002). Available on the Web at www.consumer.gov/idtheft/reports/gao-d02363.pdf.

5. In September 2000, in fact, the House Subcommittee on Government Management, Information, and Technology released its first report card on Computer Security in the Federal Government. In the committee's view, the government's overall grade was a D-, and a number of agencies that routinely gather information about employees—including the Office of Personnel Management, Health & Human Services, Small Business Administration, and Labor—received failing grades.

6. Ironically, the 1890 census records no longer exist. A portion of the records were damaged by fire and water, and the remainder were destroyed by the Library of Congress in the mid-1930s.

7. For a fascinating overview of punch card technology and in particular, the history of the phrase "do not fold, spindle, or mutilate," see the article by Steven Lubar, "'Do not fold, spindle, or mutilate': A cultural history of the punch card," Smithsonian Institution (May 1991). Downloaded on June 18, 2002, from ccat.sas.upenn.edu/slubar/fsm.html.

8. In the early 1960s, the computer industry was jokingly referred to as "Snow White" (IBM) and the "Seven Dwarves" (Burroughs, Control Data, General Electric, Honeywell, NCR, RCA, and Sperry Rand). Today, of course, IBM is better known by the nickname "Big Blue."

9. Although Dean was probably speaking generally, he was also referring specifi- cally to a list of twenty individuals prepared for him by the office of Charles W. Colson. From Facts on File, Watergate and the White House, vol. 1, pp. 96–97.

10. "Frequently Asked Questions," U.S. Administration for Children and Families website. Downloaded on September 15, 2002, from the Web at URL www.acf.dhhs.gov/programs/cse/newhire/nh/q-apam2.htm.

11. Letter from Frank Fuentes to all State IV-D Directors (February 8, 2001). Available on the Administration for Children and Families website at www.acf.dhhs.gov/programs/cse/pol/dcl-01-10.htm.

12. Niall McKay, "Cyber Terror Arsenal Grows," Wired magazine (October 1998). Viewed online at wired.com/news/news/politics/story/15643.html.

13. Poindexter was convicted in 1990 on five felony counts of misleading Congress and making false statements, but his conviction was overturned by an appeals court on the grounds that Congress had granted him immunity for his testimony.

14. William Safire, "You Are a Suspect," The New York Times (November 14, 2002).

15. Raphael Lewis, "Transport worker ID in the works," Boston Globe (August 24, 2002) p. A1. The Transportation Security Administration website can be viewed at tsa.gov.

16. David Bond, "TSA's Fresh Start Has a Price Tag," Aviation Week & Space Technology (September 16, 2002).




The Naked Employee. How Technology Is Compromising Workplace Privacy
Naked Employee, The: How Technology Is Compromising Workplace Privacy
ISBN: 0814471498
EAN: 2147483647
Year: 2003
Pages: 93

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net